Configuration manual
Index
IN-24
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
J
join messages, IGMP 24-3
K
KDC
described 8-32
See also Kerberos
keepalive messages 18-2
Kerberos
authenticating to
boundary switch 8-35
KDC 8-35
network services 8-35
configuration examples 8-32
configuring 8-35
credentials 8-32
cryptographic software image 8-32
described 8-32
KDC 8-32
operation 8-34
realm 8-34
server 8-34
support for 1-11
switch as trusted third party 8-32
terms 8-33
TGT 8-34
tickets 8-32
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling 17-9
See EtherChannel
Layer 2 frames, classification with CoS 36-2
Layer 2 interfaces, default configuration 11-17
Layer 2 protocol tunneling
configuring 17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-12
Layer 2 traceroute
and ARP 47-13
and CDP 47-12
broadcast traffic 47-12
described 47-12
IP addresses and subnets 47-13
MAC addresses and VLANs 47-13
multicast traffic 47-13
multiple devices on a port 47-13
unicast traffic 47-12
usage guidelines 47-12
Layer 3 features 1-12
Layer 3 interfaces
assigning IP addresses to 38-7
assigning IPv4 and IPv6 addresses to 39-14
assigning IPv6 addresses to 39-12
changing from Layer 2 mode 38-7, 38-82, 38-83
types of 38-5
Layer 3 packets, classification methods 36-2
LDAP 5-2
Leaking IGMP Reports 21-4
LEDs, switch
See hardware installation guide
Lightweight Directory Access Protocol
See LDAP
line configuration mode 2-3
Link Aggregation Control Protocol
See EtherChannel
Link Failure, detecting unidirectional 19-7
Link Layer Discovery Protocol
See CDP
link local unicast addresses 39-3